Credibility authorization method, system, credibility security management center and server

A security management and server technology, applied in the field of systems, trusted authorization methods, trusted security management centers and servers, can solve problems such as illegal access and achieve the effect of avoiding illegal access

Active Publication Date: 2014-04-02
CEC CYBERSPACE GREAT WALL
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the access control strategy simply deployed on the SAN is easy for intruders to skip the protection through deception, and the existing authentication mechanism of the client only ensures security and reliability between the server and the client. If the server is compromised by the intruder After that, the data of the storage device in the SAN can still be illegally accessed by intruders

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credibility authorization method, system, credibility security management center and server
  • Credibility authorization method, system, credibility security management center and server
  • Credibility authorization method, system, credibility security management center and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order for those skilled in the art to better understand the technical solution of the present invention, the trusted authorization method, system, trusted security management center and server provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0061] figure 1 The flow chart of the trusted authorization method provided by Embodiment 1 of the present invention, such as figure 1 As shown, the method includes:

[0062] Step 101, receiving platform measurable information and user measurable information sent by a server.

[0063] Each step in this embodiment may be executed by a trusted security management center. In this step, specifically, the platform measurable information includes hash information and measurable logs, and the user measurable information includes user names and passwords.

[0064] Step 102: Judging whether the measurable information of the platform is credible and whether the measurable...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credibility authorization method, a system, a credibility security management center and a server. The credibility authorization method comprises the followings steps: receiving platform metrizable information and user metrizable information transmitted by the server; judging whether the platform metrizable information is credible or not, and judging whether the user metrizable information is credible or not; if the platform metrizable information is credible and the user metrizable information is credible according to judgment, generating authorization success information; transmitting the authorization success information to the server. The server can only access storage equipment after receiving the authorization success information successfully, and an intruder can be prevented from accessing the storage equipment directly after the server is intruded, so that data in the storage equipment are effectively prevented from being accessed illegally.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a trusted authorization method, system, trusted security management center and server. Background technique [0002] A storage area network (Storage Area Network, SAN for short) storage system has the characteristics of high speed and high scalability. In recent years, more and more units and institutions choose SAN to build information storage centers for core data, and the importance of SAN storage system security has become increasingly prominent. Therefore, research on SAN security has attracted more and more attention. First of all, because the default Fiber Channel (FC) protocol is used in a safe environment, the protocol was not fully considered in terms of security at the beginning of its design; secondly, there is also a lack of effective access control in the SAN. Once the server connected to the storage device is compromised, the storage device in the Fib...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 江海昇邹起辰陈幼雷郭伟
Owner CEC CYBERSPACE GREAT WALL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products